General

  • Target

    0d1fa230547e8327115e01b3f5956133.zip

  • Size

    416KB

  • Sample

    240901-dpr1eszgle

  • MD5

    9c5caecc1e1d0d6bbce32a22718afa92

  • SHA1

    30cbd391f1785b882959463f333afb797a8c93c4

  • SHA256

    f171614979a8a8e605abcc22ba61300a7597670861ba014570e3c8c9dee7590a

  • SHA512

    d3956b50aca9d4212383af6387a7339b39e1180efb1897d3992c720f59d141c7cb53f294470335271eaa0ce13bec752160059565ec44ca337da31e59df7e3027

  • SSDEEP

    6144:Ne+crvUq7YAJQsoS9s7JbxZy55zvhhBh/IN2KpIZJsyh5KBM6cfAbvUNRpPq:YlrP7CsoR2zrK2XZJPqxONNRo

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    xxxlahot2

Targets

    • Target

      8e3e00075143d3fd621479fb61188c41560186ce1877e83e9d1e938b866adef6

    • Size

      498KB

    • MD5

      0d1fa230547e8327115e01b3f5956133

    • SHA1

      a2942ed55a16fd4b0ca9ac6b7552fbeb5509ecb7

    • SHA256

      8e3e00075143d3fd621479fb61188c41560186ce1877e83e9d1e938b866adef6

    • SHA512

      7dd223bb25b6ad0f7ec0beb6880ba0fc29404cae8f5548745172f7ae04abe34668e4b3183f3869c4dabf4fcd7fd512976363d4909bd9156b47625598e259a414

    • SSDEEP

      6144:FuxpYkSlNpfOCgxdx1ZcGv9WMPznQIGHnmC7I85eVmftpQ6cxHn8eI+mOmFzivqb:F35OCgLxbZvTgzEeqmf3Q7vsFz2qb

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • AgentTesla payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks